<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Hospitals &amp; Medical Centers</title>
    <description>
      <![CDATA[Unique and shared problems to solutions in healthcare specific to products and services.]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2247-hospitals-medical-centers</link>
    <language>en-us</language>
    <item>
      <title>Healthcare Executives Face a New Era of Personal Risk</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Protecting executives’ digital and physical environments is no longer optional.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102208</guid>
      <pubDate>Tue, 07 Apr 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102208-healthcare-executives-face-a-new-era-of-personal-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/06/Man-on-laptop-by-Vitaly-Gariev.webp?t=1775680873" type="image/png" length="346927"/>
    </item>
    <item>
      <title>Stryker Update: FBI Seizes Website of Iran-Linked Hackers</title>
      <author></author>
      <description>
        <![CDATA[<p>The FBI has seized the website of the Iranian-linked hackers believed to be behind the recent cyberattack against Stryker.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102190</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102190-stryker-update-fbi-seizes-website-of-iran-linked-hackers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Computer-with-binary-code-hovering-nearby-by-Steve-Johnson.webp?t=1773948437" type="image/png" length="376534"/>
    </item>
    <item>
      <title>Targeted Phishing Attack Breaches Biotech Company Data</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Intuitive faced a data breach due to a phishing attack.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102178</guid>
      <pubDate>Mon, 16 Mar 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102178-targeted-phishing-attack-breaches-biotech-company-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Stethoscope-in-monochrome-by-Hush-Naidoo-Jade-Photography.webp?t=1773673171" type="image/png" length="284105"/>
    </item>
    <item>
      <title>Suspected Iranian Cyberattack Targets U.S. Medtech Company Stryker</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Stryker, a major U.S. medical technology organization, has been disrupted by a cyberattack.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102168</guid>
      <pubDate>Wed, 11 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102168-suspected-iranian-cyberattack-targets-us-medtech-company-stryker</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/11/Red-laptop-by-Mithun-V.webp?t=1773245268" type="image/png" length="487277"/>
    </item>
    <item>
      <title>Top 20 Healthcare Data Breaches of 2025</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine breaks down the top 20 breaches in healthcare for 2025.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102127</guid>
      <pubDate>Tue, 17 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102127-top-20-healthcare-data-breaches-of-2025</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/16/Medical-supplies-by-Kristine-Wook.webp?t=1771464183" type="image/png" length="460581"/>
    </item>
    <item>
      <title>Shadow AI: The Invisible Insider Threat</title>
      <description>
        <![CDATA[<p>AI adoption in healthcare is inevitable, but it gives every clinician and staff member the potential to become an unintentional insider threat.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102122</guid>
      <pubDate>Thu, 12 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102122-shadow-ai-the-invisible-insider-threat</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/09/Shadow-behind-opaque-wall-by-Stefano-Pollio.webp?t=1771464183" type="image/png" length="194493"/>
    </item>
    <item>
      <title>55% Healthcare Workers Faced Increases in Violence — How Is Security Adapting to Protect Them?</title>
      <author></author>
      <description>
        <![CDATA[<p>How are organizations responding to rising threats against healthcare staff? </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102119</guid>
      <pubDate>Wed, 11 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102119-55-healthcare-workers-faced-increases-in-violence-how-is-security-adapting-to-protect-them</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/06/Healthcare-worker-by-Nappy.webp?t=1770858201" type="image/png" length="349288"/>
    </item>
    <item>
      <title>Healthcare Cybersecurity Is in Crisis — These Proven Controls Could Be the Cure</title>
      <description>
        <![CDATA[<p>New analysis of healthcare cyber losses suggests that foundational controls remain the most effective at reducing risk.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102112</guid>
      <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102112-healthcare-cybersecurity-is-in-crisis-these-proven-controls-could-be-the-cure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/04/Medical-professional-using-tablet-by-Nappy.webp?t=1770217941" type="image/png" length="458228"/>
    </item>
    <item>
      <title>Communication Criticized in Handling of Recent Healthcare Hack</title>
      <author></author>
      <description>
        <![CDATA[<p>This organization’s post-breach communication concerned some individuals.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102064</guid>
      <pubDate>Mon, 05 Jan 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102064-communication-criticized-in-handling-of-recent-healthcare-hack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/05/Pills-spilled-by-Christina-Victoria-Craft.webp?t=1767629893" type="image/png" length="444900"/>
    </item>
    <item>
      <title>Cybersecurity Stagnation in Healthcare: The Hidden Financial Costs</title>
      <description>
        <![CDATA[<p>Rising breach costs and the financial impact of program immaturity.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102060</guid>
      <pubDate>Tue, 23 Dec 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102060-cybersecurity-stagnation-in-healthcare-the-hidden-financial-costs</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/22/Rendered-heart-monitors-by-MW.webp?t=1766419102" type="image/png" length="772318"/>
    </item>
    <item>
      <title>Navigating the U.S. Department of Labor’s Health Plan Cybersecurity Guidance</title>
      <description>
        <![CDATA[<p>Earlier this year the U.S. Department of Labor (DOL) broadened its cybersecurity guidance to cover all employee benefit plans, including health plans.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101942</guid>
      <pubDate>Mon, 06 Oct 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101942-navigating-the-us-department-of-labors-health-plan-cybersecurity-guidance</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/10-October/SEC-1025-F2-Feat-Slide1-1170x658.webp?t=1758914941" type="image/jpeg" length="114994"/>
    </item>
    <item>
      <title>When Hospital Security Becomes Personal</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Hospital security isn’t really about technology — it’s about trust.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101936</guid>
      <pubDate>Fri, 03 Oct 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101936-when-hospital-security-becomes-personal</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/25/Stethoscope-by-Etactics-Inc.webp?t=1763157542" type="image/png" length="262127"/>
    </item>
    <item>
      <title>145,000 Healthcare Records Exposed</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A database in the healthcare industry was exposed.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101937</guid>
      <pubDate>Thu, 02 Oct 2025 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101937-145-000-healthcare-records-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/25/Various-pills-by-freestocks.webp?t=1758827475" type="image/png" length="429413"/>
    </item>
    <item>
      <title>Disabling Hospital HVAC Is Now a Bargaining Chip in Ransomware</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Shutting down a hospital’s heating and cooling system would be a patient safety disaster.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101927</guid>
      <pubDate>Wed, 24 Sep 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101927-disabling-hospital-hvac-is-now-a-bargaining-chip-in-ransomware</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/23/Yellow-duct-work-by-Taylor-Vick.webp?t=1759369887" type="image/png" length="547082"/>
    </item>
    <item>
      <title>Georgia Hospital Notifies 160K Individuals of Breach 1 Year After Incident</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A Georgia hospital experienced a data breach on May 30, 2024, but notified affected consumers on August 27, 2025.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101893</guid>
      <pubDate>Wed, 10 Sep 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101893-georgia-hospital-notifies-160k-individuals-of-breach-1-year-after-incident</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/09/09/Doctor-by-Online-Marketing.webp?t=1757428903" type="image/png" length="419640"/>
    </item>
    <item>
      <title>Securing Hospitals and Healthcare Systems Through Integrated Video Management</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Protecting patients while safeguarding pharmaceuticals, managing visitor access while ensuring staff safety, and maintaining compliance while operating efficiently — all these challenges demand a level of coordination that traditional security approaches simply cannot provide.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101876</guid>
      <pubDate>Wed, 03 Sep 2025 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101876-securing-hospitals-and-healthcare-systems-through-integrated-video-management</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/08/29/Close-up-of-camera-by-Mehran-Biabani.webp?t=1756488406" type="image/png" length="307773"/>
    </item>
    <item>
      <title>The (Microsoft) Windows Are Wide Open for Bad Actors</title>
      <description>
        <![CDATA[<p>Most healthcare organizations won’t be able to fully transition to Windows 11 before Microsoft ends Windows 10 support.&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">That means that bad actors will soon be launching malware that takes advantage.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101865</guid>
      <pubDate>Tue, 26 Aug 2025 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101865-the-microsoft-windows-are-wide-open-for-bad-actors</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/08/25/Laptop-with-desktop-screen-showing-by-Sunrise-King.webp?t=1756949477" type="image/png" length="282476"/>
    </item>
    <item>
      <title>29 Years of HIPAA: What’s Next for Healthcare Data Privacy? </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>To commemorate the 29th anniversary of HIPAA, experts share their perspectives on modern privacy threats and how healthcare organizations can bolster security.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101854</guid>
      <pubDate>Thu, 21 Aug 2025 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101854-29-years-of-hipaa-whats-next</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/08/20/Stethoscope-by-laptop-by-National-Cancer-Institute.webp?t=1756949477" type="image/png" length="407781"/>
    </item>
    <item>
      <title>Efficient Cybersecurity: Saving Rural Hospitals, Their Patients, And Their Bottom Lines Economically</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">H.R.1’s real test is not if Congress imposes cuts, but whether congressional leadership can prove that trimming cyber costs more than funding it.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101799</guid>
      <pubDate>Wed, 06 Aug 2025 12:38:55 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101799-efficient-cybersecurity-saving-rural-hospitals-their-patients-and-their-bottom-lines-economically</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/07/29/Medical-professional-on-computer-by-Irwan.webp?t=1756949477" type="image/png" length="484622"/>
    </item>
    <item>
      <title>5.4M Affected by Healthcare Data Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Episource, a medical billing organization, has notified individuals that their personal and health data was stolen in a cyberattack.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101787</guid>
      <pubDate>Mon, 21 Jul 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101787-54m-affected-by-healthcare-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/07/18/Pills-spilled-by-Christina-Victoria-Craft.webp?t=1752856396" type="image/png" length="444900"/>
    </item>
    <item>
      <title>Corey Sebera: Career Challenges Become Career Accomplishments</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Sergeant Corey Sebera turns her career struggles into opportunities with support, determination, and heart.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101742</guid>
      <pubDate>Mon, 07 Jul 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101742-corey-sebera-career-challenges-become-career-accomplishments</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/07-July/SEC-0725-WIS-Sebera-Feat-Slide1-1170x658.webp?t=1751480085" type="image/jpeg" length="92648"/>
    </item>
    <item>
      <title>$18B Is the Cost of Violence for Hospitals </title>
      <author></author>
      <description>
        <![CDATA[<p>A report finds hospitals spend more than $18 billion per year due to violence in the workplace and the community.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101717</guid>
      <pubDate>Tue, 24 Jun 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101717-18b-is-the-cost-of-violence-for-hospitals</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/06/23/Outside-of-hospital-by-National-Cancer-Institute.webp?t=1752147912" type="image/png" length="578455"/>
    </item>
    <item>
      <title>Securing Healthcare: Safeguarding Patient Care and Privacy Through Agile Cyber Strategies</title>
      <description>
        <![CDATA[<p>In today’s digital world, cybersecurity is foundational to providing adequate patient care — whether critical, preventative, or otherwise.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101649</guid>
      <pubDate>Tue, 27 May 2025 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101649-securing-healthcare-safeguarding-patient-care-and-privacy-through-agile-cyber-strategies</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/05/23/Woman-working-by-ThisisEngineering.webp?t=1749093810" type="image/png" length="537778"/>
    </item>
    <item>
      <title>Almost Half of Healthcare Breaches Involved Microsoft 365</title>
      <description>
        <![CDATA[<p>Healthcare sector suffers a rise in ransomware attacks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101621</guid>
      <pubDate>Fri, 16 May 2025 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101621-almost-half-of-healthcare-breaches-involved-microsoft-365</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/05-May/SEC-0525-News2-Feat-Slide1-1170x658.webp?t=1747078203" type="image/jpeg" length="112622"/>
    </item>
    <item>
      <title>430K Patients’ Data Exposed in Ascension Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>430K patients’ data was exposed in a breach against Ascension, and security leaders are discussing cyber threats against the healthcare industry. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101627</guid>
      <pubDate>Thu, 15 May 2025 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101627-430k-patients-data-exposed-in-ascension-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/05/14/Monitors-with-keyboard-by-Fotis-Fotopoulos.webp?t=1747235872" type="image/png" length="340025"/>
    </item>
    <item>
      <title>Security leaders share thoughts on Blue Shield of California data breach</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Blue Shield of California has notified members of a data breach that may have impacted protected health information.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101584</guid>
      <pubDate>Tue, 29 Apr 2025 11:09:38 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101584-security-leaders-share-thoughts-on-blue-shield-of-california-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/04/29/marcel-eberle-6bmOMqgfZwU-unsplash.webp?t=1745938421" type="image/jpeg" length="109222"/>
    </item>
    <item>
      <title>More than 20,000 sensitive medical records exposed</title>
      <author></author>
      <description>
        <![CDATA[<p>21,344 medical records with sensitive patient information were exposed.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101570</guid>
      <pubDate>Fri, 25 Apr 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101570-more-than-20-000-sensitive-medical-records-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/04/24/Pills-spilled-by-Christina-Victoria-Craft.webp?t=1745519528" type="image/png" length="444900"/>
    </item>
    <item>
      <title>Kidney dialysis company experiences ransomware attack</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders discuss the results of a ransomware attack against DaVita, including operational disruptions and stock market impacts.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101548</guid>
      <pubDate>Thu, 17 Apr 2025 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101548-kidney-dialysis-company-experiences-ransomware-attack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/04/16/Medical-professional-using-tablet-by-Nappy.webp?t=1744817776" type="image/png" length="458228"/>
    </item>
    <item>
      <title>Laboratory Services Cooperative experienced a cybersecurity incident</title>
      <author></author>
      <description>
        <![CDATA[<p>Laboratory Services Cooperative announced it experienced a cybersecurity incident, possibly compromising patient and employee data.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101540</guid>
      <pubDate>Tue, 15 Apr 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101540-laboratory-services-cooperative-experienced-a-cybersecurity-incident</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/04/14/Testing-tubes-by-National-Cancer-Institute.webp?t=1744642235" type="image/png" length="391258"/>
    </item>
    <item>
      <title>Ransomware incidents reached record levels in 2024</title>
      <author></author>
      <description>
        <![CDATA[<p>An analysis of global ransomware activity reveals ransomware incidents reached record levels in 2024.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101429</guid>
      <pubDate>Fri, 28 Feb 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101429-ransomware-incidents-reached-record-levels-in-2024</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/02/27/Computer-by-Boicu-Andrei.webp?t=1740671994" type="image/png" length="420607"/>
    </item>
  </channel>
</rss>
